{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:15Z","timestamp":1750221375218,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176314","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"64-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Capacity"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Le M\u00e9tayer","sequence":"first","affiliation":[{"name":"Inria, Universit\u00e9 de Lyon, Lyon, France"}]},{"given":"Pablo","family":"Rauzy","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris 8 &amp; Inria, Saint-Denis, France"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.26"},{"key":"e_1_3_2_1_3_1","unstructured":"Moritz Y. Becker Alexander Malkis and Laurent Bussard. 2010. S4P: A Generic Language for Specifying Privacy Preferences and Policies. (2010). https:\/\/research.microsoft.com\/pubs\/122108\/main.pdf  Moritz Y. Becker Alexander Malkis and Laurent Bussard. 2010. S4P: A Generic Language for Specifying Privacy Preferences and Policies. (2010). https:\/\/research.microsoft.com\/pubs\/122108\/main.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"Antonio Cau and Hussein Zedan. 1997. Refining Interval Temporal Logic specifications. Transformation-Based Reactive Systems Development. http:\/\/antonio-cau.co.uk\/ITL\/publications\/pubs\/1997--2.pdf  Antonio Cau and Hussein Zedan. 1997. Refining Interval Temporal Logic specifications. Transformation-Based Reactive Systems Development. http:\/\/antonio-cau.co.uk\/ITL\/publications\/pubs\/1997--2.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923410"},{"key":"e_1_3_2_1_6_1","unstructured":"Philip W.L. Fong Mohd Anwar and Zhen Zhao. 2009. A Privacy Preservation Model for Facebook-Style Social Network Systems ESORICS.   Philip W.L. Fong Mohd Anwar and Zhen Zhao. 2009. A Privacy Preservation Model for Facebook-Style Social Network Systems ESORICS."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Jaap-Henk Hoepman. 2014. Privacy Design Strategies. In ICT Systems Security and Privacy Protection. https:\/\/www.cs.ru.nl\/ jhh\/publications\/pdp.pdf  Jaap-Henk Hoepman. 2014. Privacy Design Strategies. In ICT Systems Security and Privacy Protection. https:\/\/www.cs.ru.nl\/ jhh\/publications\/pdp.pdf","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Christophe Lazaro and Daniel Le M\u00e9tayer. 2015. Control over Personal Data: True Remedy or Fairy Tale? SCRIPTed (2015). http:\/\/script-ed.org\/?p=1927  Christophe Lazaro and Daniel Le M\u00e9tayer. 2015. Control over Personal Data: True Remedy or Fairy Tale? SCRIPTed (2015). http:\/\/script-ed.org\/?p=1927","DOI":"10.2966\/scrip.120115.3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2010.02.002"},{"volume-title":"Formal Aspects in Security and Trust (FAST","year":"2008","author":"M\u00e9tayer Daniel Le","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Mainack Mondal Peter Druschel Krishna P. Gummadi and Alan Mislove. 2014. Beyond Access Control: Managing Online Privacy via Exposure Workshop on Useable Security. https:\/\/www.mpi-sws.org\/ mainack\/papers\/usec2014-final46.pdf  Mainack Mondal Peter Druschel Krishna P. Gummadi and Alan Mislove. 2014. Beyond Access Control: Managing Online Privacy via Exposure Workshop on Useable Security. https:\/\/www.mpi-sws.org\/ mainack\/papers\/usec2014-final46.pdf","DOI":"10.14722\/usec.2014.23046"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Raul Pardo and Gerardo Schneider. 2014. A Formal Privacy Policy Framework for Social Networks 12th International Conference on Software Engineering and Formal Methods (SEFM).  Raul Pardo and Gerardo Schneider. 2014. A Formal Privacy Policy Framework for Social Networks 12th International Conference on Software Engineering and Formal Methods (SEFM).","DOI":"10.1007\/978-3-319-10431-7_30"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_14_1","unstructured":"Jaehong Park and Ravi Sandhu. 2010. A Position Paper: A Usage Control (UCON) Model for Social Networks Privacy. (2010). https:\/\/www.w3.org\/2010\/policy-ws\/papers\/17-Park-Sandhu-UTSA.pdf  Jaehong Park and Ravi Sandhu. 2010. A Position Paper: A Usage Control (UCON) Model for Social Networks Privacy. (2010). https:\/\/www.w3.org\/2010\/policy-ws\/papers\/17-Park-Sandhu-UTSA.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_16_1","unstructured":"Wikipedia. {n. d.}. The Right to Privacy. (. {n. d.}). https:\/\/en.wikipedia.org\/wiki\/The_Right_to_Privacy_%28article%29 Accessed on 2015--11--24.  Wikipedia. {n. d.}. The Right to Privacy. (. {n. d.}). https:\/\/en.wikipedia.org\/wiki\/The_Right_to_Privacy_%28article%29 Accessed on 2015--11--24."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108906.1108908"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176314","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176314"}},"subtitle":["an Abstract Model of Control over Personal Data"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":17,"alternative-id":["10.1145\/3176258.3176314","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176314","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}